Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Defending and attacking native on-premise Kubernetes orchestration system

Do you use Kubernetes (or any other open-source container orchestration system) to help automate your software deployment and management? Watch now to learn how using default deployment settings introduces attack vectors that would allow an attacker to compromise your organisation’s systems, and what to do instead.

Operation Blindspot - Are AV/EDR solutions enough to stop advanced attacks?

Anti-virus and endpoint detection and response solutions certainly help block some emerging threats, but their blind spots can allow attackers to circumvent them. We will showcase some techniques actively used by malware to hide from security products, exfiltrate data undetected, and evade technical controls.

Beyond The Lazarus Heist – The nation-state/cybercrime nexus

The Lazarus Group is accused of carrying out a decade of cyber attacks on behalf of the North Korean Government. We hear from author and investigative journalist Geoff White as he explores what this world tells us about the growing links between government cyber attackers and organised crime gangs. In his forthcoming book (which you can pre-order here: www.penguin.co.uk/books/447163/the-lazarus-heist), Geoff explores this topic further by taking you inside the hidden world of the Lazarus gang and its global network of criminal accomplices.

Anticipate and defend against adversaries targeting SaaS and IaaS

Misconfigured APIs, over-exposed sensitive data, and shadow admins are just some of the SaaS security challenges organisations face today. Join us as we will take a deep dive into some of the most common attack scenarios and cover steps you can take to secure your SaaS and IaaS environments.

Cross-cloud hacking: Stealing Salesforce data via GitHub & Slack

Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.

A 2022 security forecast: A look to the future based on today’s developments

The term ‘predictions’ might pack more punch, but in cybersecurity, ‘forecasting’ is far more appropriate. Our expectations of the future can and should be based on the trends we see now. This session aims to help reduce uncertainty in our industry by sharing informed, evidence-backed learnings from recent trends.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.

Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue